Keyword: torrentlocker22222
37 Total Search   |   Showing Results : 1 - 20
   Next  
This detection is for web threats related to TorrentLocker . These web threats, usually URLs, are embedded in email and used to redirect to spoofed domains. These spoofed domains copy legitimate
TorrentLocker takes advantage of the 2015 tax season in the ANZ region. Trend Micro researchers found a spammed message that lures users by using penalty tax in its subject. When users click on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
HOSTS File Modification This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites: {BLOCKED}.253.22 008.wzhe123.cn {BLOCKED}.253.22 010389.com {BLOCKED
it. One thing that our engineers noted is that that the packer used here is similar to the packer used the recent TorrentLocker series of attacks that hit the ANZ region in early January 2015 .While
family: VOBFUS ZBOT TROJ_CRYPTED TROJ_CRYPCTB TROJ_CRYPTESLA TORRENTLOCKER Custom packer routines It checks if the following file exists: c:\myapp.exe It checks if it is executed on a virtual machine by
); Trojan-Ransom.Win32.Cryptolocker (Ikarus); Win32/Filecoder.DI (ESET-NOD32) TorrentLocker Run Hits Italian Targets Downloaded from the Internet, Spammed via email Connects to URLs/IPs, Displays
This TorrentLocker variant has the capability to double the amount of decryption after its 5-day deadline. It arrives via spam message purporting as a business email that targeted an Australian
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
5555555 555555 55555 44444444 4444444 444444 44444 33333333 3333333 333333 33333 22222222 2222222 222222 22222 11111111 1111111 111111 11111 00000000 0000000 00000 0987654321 987654321 87654321 7654321
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
44 4 33333333 3333333 333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321
44 4 33333333 3333333 333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321
123abc 123asd 123qwe 1q2w3e 2 21 22 222 2222 22222 222222 2222222 22222222 3 321 33 333 3333 33333 333333 3333333 33333333 4 4321 44 444 4444 44444 444444 4444444 44444444 5 54321 55 555 5555 55555 555555
1234 12345 123456 1234567 12345678 123456789 1234567890 1234abcd 1234qwer 123abc 123asd 123qwe 1q2w3e 2222 22222 222222 2222222 22222222 3333 33333 333333 3333333 33333333 4321 4444 44444 444444 4444444